<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:wfw="http://wellformedweb.org/CommentAPI/"
     xmlns:dc="http://purl.org/dc/elements/1.1/"
     xmlns:atom="http://www.w3.org/2005/Atom"
     xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
     xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
     xmlns:georss="http://www.georss.org/georss"
     xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
     xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[best federal criminal lawyer - Conaway & Strickler]]></title>
        <atom:link href="https://www.conawayandstrickler.com/blog/tags/best-federal-criminal-lawyer/feed/" rel="self" type="application/rss+xml" />
        <link>https://www.conawayandstrickler.com/blog/tags/best-federal-criminal-lawyer/</link>
        <description><![CDATA[Conaway & Strickler's Website]]></description>
        <lastBuildDate>Thu, 14 Aug 2025 17:56:35 GMT</lastBuildDate>
        
        <language>en-us</language>
        
            <item>
                <title><![CDATA[Recent Fraud Cases Highlighted by the DOJ include Cryptocurrency and Civil Forfeiture Complaints]]></title>
                <link>https://www.conawayandstrickler.com/blog/recent-fraud-cases-highlighted-by-the-doj-include-cryptocurrency-and-civil-forfeiture-complaints/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/recent-fraud-cases-highlighted-by-the-doj-include-cryptocurrency-and-civil-forfeiture-complaints/</guid>
                <dc:creator><![CDATA[Law Office of Conaway & Strickler]]></dc:creator>
                <pubDate>Sun, 03 Aug 2025 13:54:00 GMT</pubDate>
                
                    <category><![CDATA[Criminal Defense]]></category>
                
                    <category><![CDATA[cryptocurrency]]></category>
                
                    <category><![CDATA[Cybercrime]]></category>
                
                
                    <category><![CDATA[#cryptocurrency]]></category>
                
                    <category><![CDATA[#moneylaundering]]></category>
                
                    <category><![CDATA[atlanta criminal lawyer]]></category>
                
                    <category><![CDATA[atlanta federal criminal attorney]]></category>
                
                    <category><![CDATA[atlanta internet crime attorney]]></category>
                
                    <category><![CDATA[best federal criminal lawyer]]></category>
                
                    <category><![CDATA[cryptocurrency fraud charges]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                    <category><![CDATA[top federal criminal attorney]]></category>
                
                    <category><![CDATA[white collar lawyer]]></category>
                
                
                
                <description><![CDATA[<p>As we enter the 8th month of 2025, it is clear that federal agencies have ramped up enforcement of federal crimes, leading to substantial financial penalties and lengthy prison sentences. Recently, the Department of Justice highlighted enforcement efforts that allegedly aimed at protecting&nbsp; Americans from transnational fraud schemes.&nbsp; Here are some of the cases discussed:&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>As we enter the 8th month of 2025, it is clear that federal agencies have ramped up enforcement of federal crimes, leading to substantial financial penalties and lengthy prison sentences.</p>



<p>Recently, the Department of Justice highlighted enforcement efforts that allegedly aimed at protecting&nbsp; Americans from transnational fraud schemes.&nbsp; Here are some of the cases discussed:</p>



<p><a href="https://www.pacermonitor.com/public/case/58513717/USA_v_Murray">United States v. Troy Murray</a> and <a href="https://www.pacermonitor.com/public/case/58513715/USA_v_Murray">United States v. Cutter Murray</a>. On June 11, 2025, DOJ’s Consumer Protection Branch filed an Information in SDFL charging Troy Murray also known as “Steve Dixson” with conspiracy to commit wire fraud. According to court documents, Troy Murray sold to lottery fraud scammers, including Jamaicans, his lead list database containing the names, and personal information of over seven million elderly American consumers. These lists were allegedly then used to defraud elderly victims. Additionally, Cutter Murray, Troy Murray’s son, will plead guilty to one count of money laundering for receiving and then laundering $1.6 million of the fraudulent funds Troy Murray obtained.</p>



<p><a href="https://www.justice.gov/usao-ct/pr/georgia-man-charged-operating-sweepstakes-scam">United States v. Jimmy Smith</a>. On April 1, 2025 the U.S. Attorney’s Office for the District of Connecticut announced charges against Jimmy Smith, 30, a citizen of Jamaica, who resided in Hinesville, Georgia. According to court documents, Smith and others defrauded at least four victims residing in Connecticut, New York, Texas, and California, by telling them they had won a Publishers Clearing House Sweepstakes and needed to pay taxes or money to claim the prize.</p>



<p>United States v. <a href="https://www.justice.gov/usao-ma/pr/nigerian-national-pleads-guilty-role-romance-scam-and-money-laundering-scheme">Charles Uchenna Nwadavid</a>. On April 9, the U.S. Attorney’s Office (USAO) for the District of Massachusetts announced charges against Charles Uchenna Nwadavid, a citizen of Nigeria who was arrested after landing at the Dallas-Fort Worth Airport. In January 2024, a grand jury indicted Nawadavid on one count of mail fraud and two counts of money laundering. Between approximately 2016 to September 2019, Nwadavid allegedly participated in romance scams that tricked victims into sending money abroad.&nbsp; He plead guilty to mail fraud, aiding and abetting money laundering and money laundering on June 26, 2025.&nbsp; The DOJ states “romance schemes” &nbsp;generally begin when the “bad actors” recruit victims through advertisements for online relationships on dating or social media websites. Individuals perpetuating romance scams often create fictitious profiles and then use them to gain victims’ trust through a purported romantic relationship. Perpetrators then direct their victims to send money or to conduct financial transactions involving other victims’ money under false pretenses, such as an urgent need for money to secure a multi-million dollar inheritance or to pay for an unexpected hospitalization.</p>



<p>Another romance scheme can involve investing in cryptocurrency. The United States Attorney’s Office for the Northern District of Ohio (USAO) has filed a <a href="https://www.justice.gov/usao-ndoh/media/1391461/dl?inline">civil complaint in forfeiture</a> against 8,207,578 Tether (USDT) cryptocurrency, valued at more than $8.2 million in February, 2025.&nbsp; &nbsp;In that case, investigators found that scammers initially contacted the victims through seemingly misdirected, or “wrong number,” text messages. The fraudster then gained the victim’s trust and affection using various manipulative tactics. Once trust was established with the victim, the fraudster would share how much success they, or someone they knew, had with investing in cryptocurrency. This personal testimonial lessened any uncertainties the victims may have had about virtual currencies and eventually had the intended effect to persuade the victim to proceed with the investment.</p>



<p>The fraudster would then guide the victim, step-by-step, on how to open a legitimate cryptocurrency account, most often with a U.S. based virtual currency exchange such as Crypto.com or Coinbase. The scammer would walk the victim through the entire process of transferring money from their bank to the newly created cryptocurrency account. Next, the victim received instructions on how to transfer the purchased cryptocurrency assets to an online “investment platform,” which would turn out to be a fake site created by the fraudsters to look like a legitimate company. Information on the platforms promised lucrative returns which encouraged victims to invest further. However, once the victim transferred their funds to the “investment platform” they unknowingly handed over complete control and ownership of their funds to the scammer.&nbsp; These fake cryptocurrency trading platforms or fake versions of official crypto wallets to trick unsuspecting victims. These fake websites usually have similar but slightly different domain names from the sites they attempt to mimic.</p>



<p>The complaint also outlines that the perpetrators of such investment fraud schemes often allow victims to withdraw a portion of their “profits” early on in the scheme to build trust and reinforce their belief that the “investment platform” was legitimate. But as the scheme progressed, victims were unable to withdraw their funds and given excuses as to why they could not access their funds. For example, the fraudsters referred to a fake “tax” requirement, stating that taxes must be paid on the proceeds generated from the investment platform. Knowing that the scam would run its course soon, the fraudsters used last-ditch efforts to lie to victims that they had to pay a tax. Ultimately, victims were locked out of their account on the investment platform and lost their funds.</p>



<p>A woman in Lake County, Ohio became the target of such a scam when she responded to a text on her phone from an unknown number in November 2023. She began sharing information via text with the person and the two bonded over topics such as hobbies and religion. Over a period of time, the victim followed instructions from her new “friend” and opened an account at Crypto.com and then transferred funds into the account. When the victim wanted to withdraw funds, her “friend,” relented and said additional payments were needed and she complied. When the victim no longer had any funds left after making additional payments, her “friend” began to threaten her that he would send his friends to “take care of” her friends and family. Having lost her entire life savings of approximately $663,352, including funds from her Roth IRA, the victim filed a complaint with the FBI’s Internet Crime Complaint Center to report the losses in June 2024. The FBI Cleveland Division subsequently initiated an investigation.</p>



<p><a href="https://www.justice.gov/usao-ndoh/media/1402451/dl?inline">United States v. 679,981.22 Tether, et al</a>. On June 3, the U.S. Attorney’s Office for the Northern District of Ohio announced the filing of a civil forfeiture complaint against 679,981.22 in the Tether cryptocurrency suspected of being fraudulently obtained as part of a romance/investment scam. According to court documents, one victim was targeted via LinkedIn and another victim was targeted though the dating App “Coffee Meets Bagel.”</p>



<p>The experienced federal criminal defense attorneys at <a href="/lawyers/">Conaway & Strickler, PC</a> are here to protect your rights, reputation, and future should you be under investigation. With decades of experience in defending traditional financial fraud paired with a deep understanding of the newer world of cryptocurrency, our firm possesses the skills and expertise to assist those accused of any type of fraud.  Call or <a href="/contact-us/">contact us online for a confidential consultation</a>.</p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Tax Evasion]]></title>
                <link>https://www.conawayandstrickler.com/blog/tax-evasion/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/tax-evasion/</guid>
                <dc:creator><![CDATA[Law Office of Conaway & Strickler]]></dc:creator>
                <pubDate>Fri, 06 Jun 2025 13:35:00 GMT</pubDate>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                    <category><![CDATA[Federal Sentencing]]></category>
                
                    <category><![CDATA[tax evasion]]></category>
                
                    <category><![CDATA[Tax Fraud]]></category>
                
                
                    <category><![CDATA[#moneylaundering]]></category>
                
                    <category><![CDATA[#taxevasion]]></category>
                
                    <category><![CDATA[#taxfraud]]></category>
                
                    <category><![CDATA[aggravated identity theft]]></category>
                
                    <category><![CDATA[best federal criminal lawyer]]></category>
                
                    <category><![CDATA[Criminal defense]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                    <category><![CDATA[Federal Criminal Lawyer]]></category>
                
                    <category><![CDATA[PPP Loan Fraud]]></category>
                
                    <category><![CDATA[top federal criminal attorney]]></category>
                
                
                
                <description><![CDATA[<p>Tax evasion is a potential criminal charge. Tax avoidance is perfectly acceptable. 26 U.S.C. § 7201 defines what is tax evasion.&nbsp; It states in relevant part that any person who willfully attempts in any manner to evade or defeat any tax imposed by this title or the payment thereof shall, in addition to other penalties&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p><a href="https://www.law.cornell.edu/wex/tax_evasion">Tax evasion</a> is a potential criminal charge. <a href="https://apps.irs.gov/app/understandingTaxes/whys/thm01/les03/media/ws_ans_thm01_les03.pdf">Tax avoidance</a> is perfectly acceptable.</p>



<p>26 U.S.C. § 7201 defines what is <a href="https://www.justice.gov/tax/file/1293361/dl">tax evasion</a>.&nbsp; It states in relevant part that any person who willfully attempts in any manner to evade or defeat any tax imposed by this title or the payment thereof shall, in addition to other penalties provided by law, be guilty of a felony and, upon conviction thereof, shall be fined not more than $100,000 ($500,000 in the case of a corporation), or imprisoned not more than 5 years, or both, together with the costs of prosecution.</p>



<p>Federal prosecutors might also add additional charges beyond tax evasion. Those charges could include conspiracy charges, under 18 U.S.C. § 371, or tax fraud under 26 U.S.C. § 7206.&nbsp;&nbsp;The United States Sentencing Commission (USSC) recently released its <a href="https://www.ussc.gov/research/quick-facts/tax-fraud">Tax Fraud Report</a> for fiscal year 2023. It states that off the 64,124 cases reported to the Commission in fiscal year 2023, 363 involved tax fraud (down 27% since FY 2019).&nbsp; It is unclear if this downward trend will continue.</p>



<p>Recently, <a href="https://www.justice.gov/usao-nj/pr/new-jersey-man-pleads-guilty-tax-evasion">a man in New Jersey plead guilty to tax evasion</a>. According to the Department of Justice, “for tax years 2015 and 2016, Matthew Tucci, of West Long Branch, NJ, filed tax returns that stated he owed more than $2 million in taxes for both years. Despite admitting that he owed those taxes, Tucci did not fully pay them when they were due. Instead, Tucci purchased real estate and engaged in a series of transactions designed to conceal his interest in those properties.</p>



<p>In 2017, the IRS sent notices to Tucci that he owed taxes, interest, and penalties for 2015 and 2016. After receiving these notices, Tucci transferred multiple properties to an entity owned by another individual, but he continued to exert control over at least two of them. Of the two properties Tucci continued to control, he sold one and refinanced the other. Tucci used the proceeds from these transactions to pay his personal expenses rather than his tax debts. In 2019, Tucci submitted documents to the IRS that falsely claimed that he had no connection to the entity that owned the 12 properties.</p>



<p>He faces a maximum penalty of five years in prison as well as a period of supervised release, restitution, and monetary penalties. A federal district court judge will determine any sentence after considering the U.S. Sentencing Guidelines and other statutory factors.”</p>



<p>In another case, <a href="https://www.justice.gov/opa/pr/florida-businessman-sentenced-prison-tax-evasion">a Florida businessman was sentenced to prison for tax evasion</a>.&nbsp; According to the&nbsp; Department of Justice, “David Albert Fletcher, of Deltona, Florida owned and operated furniture liquidations businesses, including Century Liquidators. For tax years 2004 through 2013, Fletcher did not timely file his federal income tax returns or pay the taxes he owed. After an audit, the IRS assessed a total of $1.7 million in taxes, interest, and penalties against him.</p>



<p>To evade collection of these taxes, Fletcher concealed his income and assets from the IRS. For example, Fletcher used nominees to hide his purchases of luxury vehicles, including Rolls Royces. Fletcher also filed false income tax returns that understated his income by several million dollars, and when an IRS special agent interviewed him, Fletcher falsely represented the amount of income he earned.</p>



<p>In addition to his prison sentence, U.S. District Judge Wendy Berger for the Middle District of Florida ordered Fletcher to serve three years of supervised release and to pay approximately $7,112,689 in restitution to the United States.”</p>



<p>Recently, <a href="/lawyers/meg-strickler/">Meg Strickler</a> was able to ensure that no tax evasion charges were filed against her client.  <a href="/contact-us/">Contact us</a> if you think you might be facing tax evasion or tax fraud charges.  We are here to help.</p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Tax Crimes in Cryptocurrency]]></title>
                <link>https://www.conawayandstrickler.com/blog/tax-crimes-in-cryptocurrency/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/tax-crimes-in-cryptocurrency/</guid>
                <dc:creator><![CDATA[Law Office of Conaway & Strickler]]></dc:creator>
                <pubDate>Sun, 01 Jun 2025 13:32:00 GMT</pubDate>
                
                    <category><![CDATA[cryptocurrency]]></category>
                
                    <category><![CDATA[tax evasion]]></category>
                
                    <category><![CDATA[Tax Fraud]]></category>
                
                    <category><![CDATA[White Collar Crimes]]></category>
                
                
                    <category><![CDATA[best federal criminal lawyer]]></category>
                
                    <category><![CDATA[cryptocurrency tax]]></category>
                
                    <category><![CDATA[federal criminal defense attorney]]></category>
                
                    <category><![CDATA[federal criminal tax attorney]]></category>
                
                    <category><![CDATA[federal tax indictment]]></category>
                
                    <category><![CDATA[tax crimes]]></category>
                
                    <category><![CDATA[tax fraud]]></category>
                
                
                
                <description><![CDATA[<p>Leona Helmsley, Jim Thorpe, Webster Hubbell,&nbsp; Alphonse Capone, and Peter Madoff are among many convicted of tax crimes such as&nbsp; tax evasion and tax fraud. The government generally targets groups like tax preparation firms and entities that are mainly cash based.&nbsp; But, the criminal division of the IRS has begun a more targeted approach to&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p><a href="https://www.history.com/this-day-in-history/december-12/the-queen-of-mean-is-sentenced-to-the-slammer">Leona Helmsley</a>, <a href="https://www.nbcsports.com/golf/news/article-associated-press-jim-thorpe-pleads-guilty-tax-evasion">Jim Thorpe</a>, <a href="https://www.washingtonpost.com/archive/politics/2000/06/06/hubbells-tax-conviction-is-thrown-out/2dd8f89a-75eb-4b44-92a6-ffe47238ef35/">Webster Hubbell</a>,&nbsp; <a href="https://www.fbi.gov/history/famous-cases/al-capone">Alphonse Capone</a>, and <a href="https://archives.fbi.gov/archives/newyork/press-releases/2012/peter-madoff-former-chief-compliance-officer-and-senior-managing-director-at-bernard-l.-madoff-investment-securities-llc-pleads-guilty-to-securities-fraud-and-tax-fraud-conspiracy-in-manhattan-federal-court">Peter Madoff</a> are among many convicted of tax crimes such as&nbsp; <a href="https://www.conawayandstrickler.com/blog/basics-of-tax-evasion/">tax evasion</a> and<a href="https://apps.irs.gov/app/understandingTaxes/whys/thm01/les03/media/ws_ans_thm01_les03.pdf"> tax fraud</a>. The government generally targets groups like tax preparation firms and entities that are mainly cash based.&nbsp; But, the criminal division of the IRS has begun a more targeted approach to investigate and prosecute tax crimes in the <a href="https://www.conawayandstrickler.com/blog/irs-increased-focus-on-cryptocurrency-in-operation-hidden-treasure/">cryptocurrency</a> arena.&nbsp; Crypto investment schemes, for example, require investors to produce cash, but then convert the fraud proceeds to cryptocurrency to purposefully circumvent financial reporting requirements.&nbsp; These type of cases thus also involve potential money laundering, wire fraud and structuring charges,</p>



<p>The “newer” question on page 1 of the Tax Form 1040 now has a question that states, “At any time during the past year did you receive any financial interest in virtual currency?” In 2019, this question was only on Schedule 1.&nbsp; As of 2020, it is on page 1 of the Tax Form 1040.&nbsp; This is specifically targeted to combat cryptocurrency tax evasion.</p>



<p>Under 26 U.S.C § 7206(1), it is a criminal offense to file a tax return the filer knows is materially false.&nbsp; So, if you do not check that box on that first page, AND have substantial income in crypto, you might be targeted by the IRS.&nbsp; Remember cryptocurrencies are essentially similar to common stocks.&nbsp; This means a taxpayer <strong>must</strong> report their gains in cryptocurrencies on Form 8949.&nbsp; These gains are passed through to Schedule D on personal returns.&nbsp; The filer is responsible for paying capital gains tax on the net gain for the year.&nbsp; The government is long since versed in understanding the intricacies of the market like the role of hardware wallets, the use of DEXs, on-chain information, and how to track crypto movement across distributed ledgers.&nbsp; &nbsp;Please see <a href="https://www.irs.gov/compliance/criminal-investigation/non-payment-of-federal-income-tax-on-cryptocurrency-earnings-leads-to-conviction-for-south-florida-resident">here</a> for a recent&nbsp; example of a case where non-payment of federal income tax on cryptocurrency earnings led to a conviction.</p>



<p><a href="/contact-us/">Contact Conaway & Strickler, PC</a> if you have any questions on these complex federal criminal tax issues.  Our experienced federal criminal defense attorneys are here to help.</p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Department of Justice Fraud Prosecutions]]></title>
                <link>https://www.conawayandstrickler.com/blog/department-of-justice-fraud-prosecutions/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/department-of-justice-fraud-prosecutions/</guid>
                <dc:creator><![CDATA[Law Office of Conaway & Strickler]]></dc:creator>
                <pubDate>Wed, 28 May 2025 13:28:00 GMT</pubDate>
                
                    <category><![CDATA[Blog]]></category>
                
                    <category><![CDATA[EIDL fraud]]></category>
                
                    <category><![CDATA[False Claims Act]]></category>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                    <category><![CDATA[Fraud]]></category>
                
                    <category><![CDATA[White Collar Crimes]]></category>
                
                    <category><![CDATA[White Collar Offenses]]></category>
                
                
                    <category><![CDATA[best federal criminal lawyer]]></category>
                
                    <category><![CDATA[EIDL fraud]]></category>
                
                    <category><![CDATA[federal crimes]]></category>
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[federal criminal defense]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                    <category><![CDATA[Federal Criminal Lawyer]]></category>
                
                    <category><![CDATA[health care fraud]]></category>
                
                    <category><![CDATA[top federal criminal attorney]]></category>
                
                    <category><![CDATA[white collar lawyer]]></category>
                
                
                
                <description><![CDATA[<p>Fraud is a concept that has been in the criminal justice system forever.&nbsp; Google defines it as an intentional deception used to gain an unfair advantage or benefit, often involving financial gains.&nbsp; How does the Department of Justice prosecute fraud?&nbsp; Below is a non exhaustive list of charges that the DOJ can bring. The FBI&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>Fraud is a concept that has been in the criminal justice system forever.&nbsp; Google defines it as an intentional deception used to gain an unfair advantage or benefit, often involving financial gains.&nbsp; How does the Department of Justice prosecute fraud?&nbsp; Below is a non exhaustive list of charges that the DOJ can bring.</p>



<ul class="wp-block-list">
<li>Wire fraud</li>



<li>Mail fraud</li>



<li>Bank fraud</li>



<li>Tax fraud (tax evasion or false statements)</li>



<li>Healthcare fraud/FCA</li>



<li>Medicare/Medicaid fraud</li>



<li>PPP loan or COVID relief fraud</li>



<li>Securities fraud</li>



<li>Mortgage fraud</li>



<li>Immigration or visa fraud</li>



<li>Government contract fraud</li>



<li>Identity theft or benefits fraud</li>



<li>Trafficking in Counterfeit Goods or Services</li>



<li>Anti kickbacks</li>



<li>AML</li>
</ul>



<p>The FBI gives this <a href="https://www.fbi.gov/how-we-can-help-you/scams-and-safety/common-frauds-and-scams">list</a> of frauds and the DOJ publishes some of their cases <a href="https://www.justice.gov/criminal/criminal-fraud-cases">here</a>.</p>



<p>Fraud investigations can begin in a number of ways. In many cases, they are triggered by:</p>



<ul class="wp-block-list">
<li>A whistleblower or former employee</li>



<li>A suspicious activity report</li>



<li><a href="https://www.fbi.gov/how-we-can-help-you/scams-and-safety/common-frauds-and-scams">A suspicious activity report (SAR)</a> from a bank or financial institution</li>



<li>Data flagged by automated fraud detection software</li>



<li>A referral from another federal agency (e.g., IRS, SBA, USPS, HHS)</li>



<li>A civil audit or regulatory review that uncovers irregularities</li>



<li>Investigative journalism or public tips</li>



<li><a href="https://www.conawayandstrickler.com/blog/the-new-fincen-rule-for-residential-real-estate-what-it-means-for-investors-and-legal-compliance/">Problems in real estate transactions</a>.  (FINCEN’s new rule extends Anti-Money Laundering (AML) and Countering the Financing of Terrorism (CFT) obligations to investment advisers involved in these transactions)</li>
</ul>



<p>Once red flags are detected, the matter is referred to a federal investigative agency. These can include:</p>



<ul class="wp-block-list">
<li><strong>Federal Bureau of Investigation (FBI)</strong></li>



<li><strong>Internal Revenue Service – Criminal Investigation (IRS-CI)</strong></li>



<li><strong>Office of Inspector General (OIG)</strong></li>



<li><strong>Postal Inspection Service (USPIS)</strong></li>



<li><strong>Securities and Exchange Commission (SEC)</strong></li>



<li><strong>Health and Human Services (HHS)</strong></li>



<li><strong>Small Business Administration (SBA)</strong></li>
</ul>



<p>If you have been contacted by federal agents FOR ANY REASON, contact a federal criminal defense attorney immediately.&nbsp; Do not speak period.&nbsp; If you have received a grand jury subpoena, contact a federal criminal defense attorney immediately.&nbsp; If you have received a target letter, contact a federal criminal defense attorney immediately.&nbsp; If you are being audited by the IRS, SBA, HHS or another agency, contact a federal criminal defense attorney immediately. It never hurts in this&nbsp; last instance to have sage advice before the investigation goes any further.</p>



<p>At Conaway & Strickler, PC, we are here to help. <a href="/contact-us/">Contact us</a> to discuss your options.</p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Deferred Prosecution Agreements in the Health Care Field]]></title>
                <link>https://www.conawayandstrickler.com/blog/deferred-prosecution-agreements-in-the-health-care-field/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/deferred-prosecution-agreements-in-the-health-care-field/</guid>
                <dc:creator><![CDATA[Law Office of Conaway & Strickler]]></dc:creator>
                <pubDate>Sat, 08 Mar 2025 13:16:00 GMT</pubDate>
                
                    <category><![CDATA[False Claims Act]]></category>
                
                    <category><![CDATA[Health Care]]></category>
                
                    <category><![CDATA[Physician License Defense]]></category>
                
                
                    <category><![CDATA[best federal criminal lawyer]]></category>
                
                    <category><![CDATA[deferred prosecution agreements]]></category>
                
                    <category><![CDATA[False Claims Act]]></category>
                
                    <category><![CDATA[federal crimes]]></category>
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[federal criminal defense]]></category>
                
                    <category><![CDATA[health care fraud]]></category>
                
                
                
                <description><![CDATA[<p>The federal government may target organizations and businesses as well as individuals for violations of federal criminal statutes.&nbsp; For example, in the health care realm, cases can include office managers, practitioners from doctors, nurses to pharmacists to all other aspects of the medical industry.&nbsp; Recent federal investigations have targeted pill mills, medicaid fraud, and accepting&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>The federal government may target organizations and businesses as well as individuals for violations of federal criminal statutes.&nbsp; For example, in the health care realm, cases can include office managers, practitioners from doctors, nurses to pharmacists to all other aspects of the medical industry.&nbsp; <a href="https://www.justice.gov/criminal/criminal-fraud/health-care-fraud-unit/2024-national-hcf-case-summaries">Recent federal investigations</a> have targeted pill mills, medicaid fraud, and accepting kickbacks among others.</p>



<p>Experienced federal criminal defense attorneys like those at <a href="/lawyers/meg-strickler/">Conaway & Strickler, PC</a> may suggest early on about the possibility of entering into a “deferred prosecution agreement” which is essentially a contract with the Department of Justice. DPAs are frequently used in cases involving corporate fraud, bribery, and antitrust violations.  These pretrial agreements may involve an admission of wrongdoing, the payment of fines, and the implementation of compliance measures.  Charges may be dropped if the defendant complies with the requirements of the agreement.  Generally, the Assistant United States Attorney will file the criminal complaint and the DPA with the court, so it is of public record. This will be accompanied by a formal request to the court that any prosecution be delayed according to the terms of the DPA, allowing the defendant to fulfill its agreed-upon actions.  This is very similar to conditional discharge / pre trial diversion agreements found at the state level.</p>



<p>An example of a <a href="https://www.justice.gov/d9/2023-08/415809.pdf">DPA</a> would be one that was entered in to by the DOJ and Teva Pharmaceuticals USA, Inc in August 2023 in response to the company’s involvement in a price fixing conspiracy involving several pharmaceuticals.&nbsp; &nbsp;As seen in this example, terms can include paying a fine, waiving certain rights, agreeing to a factual basis for the charges, and an agreement to cooperate and compliance monitoring and of course, agreeing to what will happen if there is a breach of the agreement.</p>



<p>The central benefit to entering in to a DPA is that the individual or business entity is not convicted of any crime. It offers an opportunity to have the federal criminal charges dismissed or dropped once the accused completes all the required conditions.</p>



<p><a href="https://www.gibsondunn.com/wp-content/uploads/2020/01/Avanir-Pharmaceuticals-DPA.pdf">Here</a> is an another example of a DPA entered in to with the NDGA and Avanir Pharmaceuticals.&nbsp; This pharmaceutical manufacturer based in Aliso Viejo, California, was charged for paying kickbacks to a physician to induce prescriptions of its drug Nuedexta.&nbsp; &nbsp;Of note in that case – the Northern District of Ohio indicted four individuals, including former Avanir employees and one of the top prescribers of Nuedexta in the country, who were involved in the kickback scheme.&nbsp; So, the company itself entered in to a DPA but there was still fall out with respect to some individuals and receiving criminal indictments.</p>



<p>Early intervention is key in a successful resolution in health care criminal matters.  We have extensively blogged about health care fraud.   <a href="/contact-us/">Contact us</a> if you need an experienced federal criminal defense litigator.  Our firm has vast experience in white collar criminal investigations including False Claims Act and antitrust investigations.</p>



<p></p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Anatomy of an Options Trading Scheme case in Federal Court in Atlanta]]></title>
                <link>https://www.conawayandstrickler.com/blog/anatomy-of-an-options-trading-scheme-case-in-federal-court-in-atlanta/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/anatomy-of-an-options-trading-scheme-case-in-federal-court-in-atlanta/</guid>
                <dc:creator><![CDATA[Law Office of Conaway & Strickler]]></dc:creator>
                <pubDate>Sun, 26 Jan 2025 18:38:00 GMT</pubDate>
                
                    <category><![CDATA[SEC]]></category>
                
                    <category><![CDATA[SEC complaint]]></category>
                
                    <category><![CDATA[securities fraud]]></category>
                
                
                    <category><![CDATA[best federal criminal lawyer]]></category>
                
                    <category><![CDATA[federal criminal defense]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                    <category><![CDATA[federal indictment]]></category>
                
                    <category><![CDATA[options trading scheme]]></category>
                
                    <category><![CDATA[SEC Complaint]]></category>
                
                    <category><![CDATA[securities fraud]]></category>
                
                    <category><![CDATA[top federal criminal attorney]]></category>
                
                
                
                <description><![CDATA[<p>Milan Patel and four other defendants were charged both by the SEC and the Department of Justice for their role in an options trading scheme in the Northern District of Georgia.&nbsp; Another defendant, Bart Ross was sentenced a few years ago for the same scheme.&nbsp; In total, In total, the defendants executed more than 500&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p><a href="https://www.sec.gov/files/litigation/complaints/2023/comp-pr2023-33.pdf">Milan Patel</a> and four other defendants were <a href="https://americankahani.com/business/quick-buck-indian-american-charged-for-spreading-false-rumors-about-public-firms/">charged</a> both by the SEC and the Department of Justice for their role in an options trading scheme in the Northern District of Georgia.&nbsp; Another defendant, <a href="https://www.justice.gov/usao-ndga/pr/former-registered-broker-admits-involvement-options-trading-scheme">Bart Ross</a> was sentenced a few years ago for the same scheme.&nbsp; In total, In total, the defendants executed more than 500 trades and made $2,651,320 in profits as a result of their fraudulent scheme.&nbsp; And just last week, Mr. Patel was <a href="https://www.justice.gov/usao-ndga/pr/five-defendants-sentenced-options-trading-scheme">sentenced.</a></p>



<p>According to the NDGA DOJ news release:</p>



<p><em>According to Acting U.S. Attorney Moultrie, the charges and other information presented in court: Between approximately October 2017 and January 2020, Milan Patel, Bart Ross, Mark Melnick, Anthony Salandra, and Charles Parrino conspired to trade securities—primarily short-term call options—in large, publicly traded companies based on materially false rumors about those companies that they generated and disseminated. These materially false rumors were intended to increase the price of the securities (both the underlying stock and options).</em></p>



<p><em>Call options are essentially a contract that gives the options’ holder the right, but not the obligation, to buy shares of the underlying stock at a set price per share—the option’s strike price—on or before a set future date (the option’s expiration date). Generally, the holder of a call option benefits when the price of the underlying stock increases. Short-term call options are ones that generally expire within a week.</em></p>



<p><em>Ross, Salandra, and Parrino, were formerly registered brokers with the Financial Industry Regulatory Authority (FINRA) and were responsible for drafting some of the fraudulent rumors. The conspirators would often refine a proposed rumor by exchanging drafts among themselves using the Trillian instant messaging application.</em></p>



<p><em>Melnick was a day trader and T3 Live Senior Trading Strategist who often provided technical evaluations on whether a particular false rumor would be successful. These rumors were carefully crafted to: (a) appear plausible enough to other market participants to move the price of the underlying security; and (b) move the price of the security in a particular direction—namely move the stock or option price up—so that Patel and the other conspirators could profitably trade on the rumors.</em></p>



<p><em>Patel was responsible for disseminating the rumor via Trillian to multiple accounts, which would in turn result in the false rumor being distributed over one or more market subscription services, including Trade The News, TradeXchange, and Benzinga, as well as various Twitter accounts.</em></p>



<p><em>Before Patel disseminated the rumor, the co-conspirators would acquire a position in the publicly traded company that was the subject of the rumor. The co-conspirators purchased short-term call options often mere seconds before Patel disseminated the rumor. The conspirators often purchased short-term call options because the price of such options is more sensitive than the price of the underlying stock. The conspirators profited from their scheme by selling the options (or other securities) after they increased in price. They would then sell off their positions shortly after the rumor was disseminated and the price of the option or underlying stock had increased</em>.</p>



<p>Most of these defendants ended up with a plea with one count of conspiracy to commit wire and securities fraud.&nbsp; When you see a case where the original situation with most defendants are charged in an indictment, and it ends with a plea to a one count, criminal information – this is good news. This means that the federal criminal defense lawyer has done their job well and worked out a resolution that limits the sentencing guidelines and ultimate months of incarceration.</p>



<p>In this case, if one has plead to Conspiracy to commit wire and securities fraud, the base offense level would be a 6.&nbsp; There will be an increase pursuant to the <a href="https://guidelines.ussc.gov/apex/r/ussc_apex/guidelinesapp/guidelines?app_gl_id=%C2%A72B1.1">chart</a> on what the intended loss amount is.&nbsp; There also can be enhancements such as:</p>



<ul class="wp-block-list">
<li>the number of victims</li>



<li>being a registered broker at the time of the offense</li>



<li>abuse of position of trust</li>



<li>sophisticated means</li>



<li>use of a special skill</li>
</ul>



<p>Then, there can be levels taken off for acceptance of responsibility and zero point offender.&nbsp; And finally, if the defendant has any criminal history the final number will be amended pursuant to Criminal History Category.&nbsp; Once the <a href="https://www.ussc.gov/sites/default/files/pdf/guidelines-manual/2023/Sentencing_Table.pdf">final number</a> is determined by the judge, the second part of the sentencing hearing will occur – discussing <a href="https://www.law.cornell.edu/uscode/text/18/3553">3553 factors.</a></p>



<p><a href="https://www.conawayandstrickler.com/contact-us.html">Contact</a> an experienced federal criminal defense lawyer like Conaway & Strickler, PC. We have close to 30 years experience in federal criminal and SEC defense.</p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[What to Expect in a Federal Criminal Trial]]></title>
                <link>https://www.conawayandstrickler.com/blog/what-to-expect-in-a-federal-criminal-trial/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/what-to-expect-in-a-federal-criminal-trial/</guid>
                <dc:creator><![CDATA[Law Office of Conaway & Strickler]]></dc:creator>
                <pubDate>Sun, 12 Jan 2025 20:22:00 GMT</pubDate>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                
                    <category><![CDATA[best federal criminal lawyer]]></category>
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[federal criminal defense]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                    <category><![CDATA[Federal Criminal Lawyer]]></category>
                
                    <category><![CDATA[top federal criminal attorney]]></category>
                
                    <category><![CDATA[white collar lawyer]]></category>
                
                
                
                <description><![CDATA[<p>A federal criminal trial consists of several different stages.&nbsp; &nbsp;The below will analyze a ONE defendant trial.&nbsp; But, more often than not, trials can consist of multiple defendants at trial.&nbsp; This just augments the time needed for each stage. Jury Selection also known as Voir Dire Jury selection is one of the most important parts&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>A federal criminal trial consists of several different stages.&nbsp; &nbsp;The below will analyze a ONE defendant trial.&nbsp; But, more often than not, trials can consist of multiple defendants at trial.&nbsp; This just augments the time needed for each stage.</p>



<p><strong>Jury Selection also known as Voir Dire</strong></p>



<p>Jury selection is one of the most important parts of a federal criminal trial.&nbsp; It will start with about 40 potential jurors brought in. Usually we move our chairs to the other side of the table to face them. We ask general questions, then individual questions. Then, we deliberate on who to choose. Then, the court asks us to do our strikes, and then a jury is empaneled.</p>



<p>This usually takes a full day.</p>



<p><strong>Opening Statement</strong></p>



<p>After the jury has been empaneled and sworn, and loads of logistical information is given to the jurors by the judge, then&nbsp;the federal district court judge will invite the AUSA to give their opening statement. Like the jury selection, the opening statement is a critical part of a federal criminal trial.</p>



<p>The purpose of the opening statement is to allow the parties to explain to the jury what the case is about. While the parties may discuss the evidence, and explain what they believe it will show, they are not allowed to make arguments about what they think the evidence means.</p>



<p>After the AUSA has given their opening statement, which they are required to do because they have the burden of proof, the federal district court judge will ask the defense attorney if (s)he wishes to give an opening statement. The judge asks this in the form of a question because the defense attorney is not required to give an opening statement.</p>



<p>In a criminal case, the federal criminal defense lawyer may either give an opening statement, waive the opening statement, or waive the opening statement at that time, instead giving their opening statement at the close of the AUSA’s case.&nbsp; If this was a multi defendant trial, the judge usually will go in order as it is depicted on the most recent indictment.</p>



<p><strong>Direct Examination</strong> begins after we are done with the opening statements.&nbsp; The AUSA will begin calling their witnesses.&nbsp; Federal criminal defense attorney teaches <a href="https://law.gsu.edu/profile/meg-strickler/">advanced evidence</a> to LLM and JD students and GSU law and <a href="https://law.emory.edu/news-and-events/releases/2024/05/2024-05-20-keptt-kessler-eidson-trial-techniques-emory-law.html">trial techniques</a> at Emory Law.&nbsp; She literally teaches the <a href="https://www.uscourts.gov/sites/default/files/evidence_federal_rules_pamphlet_dec_1_2023.pdf">Federal Rules of Evidence</a> on what comes in at trial and how to do direct and cross examinations to law students.</p>



<p>Most direct examinations include three stages: </p>



<p>1. Introduction and background of the witness. <br>2. Laying the foundation of their relation to the case<br>3. Substantive questions about the case.</p>



<p>Like all criminal cases, in a federal criminal trial, the entire burden of proof is on the AUSA. In thinking how to proceed, an AUSA will consider all elements of the crimes alleged. This is because every crime is made up of parts, or elements. The elements are set forth in the instructions to the jury. To prevail, the AUSA must prove each and every element of the crime. Consequently, the AUSA will call witnesses that have information they believe will help persuade the jury that an element has been satisfied.</p>



<p>Because this is direct examination, the AUSA may only ask open ended questions. This is often as simple as, “what happened next?” A question used for direct examination may not suggest an answer. Therefore, it would not be appropriate for the AUSA to tell the witness what they think happened, and then ask the witness to agree. Thus, the AUSA cannot properly say “and the next thing that happened was….do you agree?” This leading question would constitute cross-examination. The party who called the witness may not “lead” the witness and may only ask direct examination questions. Such a leading question would likely prompt the objection of any of us federal criminal defense lawyers.</p>



<p>There are some exceptions to this rule, however, and some leading questions are allowed during direct examination. For example, Rule 611 of the Federal Rules of Evidence suggests that an AUSA may use cross-examination as necessary to “develop the witnesses testimony.” Leading questions may also be used with a “hostile witness.”</p>



<p>Once the witness has testified on direct, the defense lawyer will get to conduct <strong>Cross-Examination</strong> of the government’s witnesses.</p>



<p>We may ask questions of the government’s witness after the AUSA has completed their direct examination. Again, the defense attorney is not required to ask questions because they have no burden of proof. While there may be strategic reasons for waiving a witness, in some instances, we will engage in extensive and detailed questioning or cross-examination of the government witness.</p>



<p>Most cross-examination questions include the following:</p>



<p>1. We draft question to elicit any positive information from the witness. <br>2. We work to limit the damage done by the cross-examination. <br>3. We will impeach the witness where appropriate.</p>



<p>The defense attorney’s questioning can proceed by either direct or leading questions. A leading question is one that suggests the answer. This is called cross-examination. The purpose of cross-examination is to expand on the witness’s testimony, and possibly to show that the witness lacks credibility or that their fact statements are wrong or misleading.</p>



<p>Cross-examination may also be used by us&nbsp;defense attorneys to show the jury that the government witness lacks actual knowledge, or that their knowledge is limited. This is especially true for expert witnesses. To expand on the above example, a defense attorney may cross-examine a forensic computer expert by asking them questions to show that they lack credentials. A cross-examination like this might be a simple statement to the witness such as “you don’t have a computer science degree?”</p>



<p>At the end of the government’s case, when there are no more witnesses or evidence, the AUSA will tell the judge that they “rest.” This means the AUSA’s case is completed.</p>



<p>At this juncture, we will all orally ask for a&nbsp;<strong>Motion for Directed Verdict</strong></p>



<p>In a federal criminal case, a motion for directed verdict is a motion requesting the judge to acquit the defendant as a matter of law. If the motion is granted, the case is done, and the defendant is declared the winner. A motion for directed verdict is also called a judgment as a matter of law.</p>



<p>While a motion for judgment as a matter of law may be made at any time before the case is submitted to the jury, the first opportunity for a federal criminal defense attorney to make such a motion is after the government has rested its case. In the attorney’s motion, we&nbsp;will offer to the judge any applicable law and explain why, based on this law, the facts of the case entitle the defendant to be found not guilty. An AUSA may not make a motion for directed verdict after the defense has rested.</p>



<p>In a typical federal criminal trial, once the AUSA has indicated that the government has rested its case, the district court judge will instruct the bailiff to escort the jury out of the courtroom. The judge will then ask the defense attorney if they have a motion for directed verdict. If the answer is no, then the jury will be brought back into the courtroom and the case will continue. Motions for directed verdict are always made outside the presence of the jury.</p>



<p>A federal criminal defense attorney may also make a motion for directed verdict at the end of the attorney’s case; meaning, after the defense has indicated to the court that they rest. This is because, as indicated, Rule 50 of the Federal Rules of Procedure allow a motion as a matter of law to be made any time before the jury has reached its verdict.</p>



<p><strong>DEFENSE:&nbsp;</strong></p>



<p>The defendant in a criminal case enjoys a presumption of innocence. One of the benefits of this presumption is that a person accused of a crime does not have an obligation to prove their innocence to the jury. This means there is no obligation to call any witnesses or produce any evidence. However, depending on the facts and circumstances of a case, it may be in the your best interest to call witness or provide evidence.</p>



<p>So, should any of us federal criminal defense attorneys call a witnesses, just as when the AUSA calls witnesses, the attorney may only ask this witness direct examination question, and the AUSA may cross-examine this witness using leading questions.</p>



<p>One of the witnesses that is available only to the defense attorney is the defendant. In a criminal case the accused has the right to remain silent. Therefore, only the defense attorney can call the accused to the stand. Whether to call the accused as a witness is often one of the most difficult questions for a federal criminal defense attorney. However, the final answer to this question resides completely with YOU. The decision must not be made by the lawyer.</p>



<p>Once all of&nbsp;the defense attorneys call all of&nbsp;their witnesses (if any), they will indicate to the court that “the defense rests.”</p>



<p>Next, we move to The <strong>Government’s Rebuttal Witnesses</strong></p>



<p>The defense may call rebuttal witnesses after it has rested because the government has the burden of proof. Rebuttal witnesses serve largely the same function as cross-examination in that they are used as part of an attempt, in this case by the government, to disprove evidence submitted by the defendant or to disprove what the defense witnesses said. It is rare, but possible, for the federal district court judge to allow what is called surrebuttal on the part of the defense. A surrebuttal witness is called by a party to respond to the opposing party’s rebuttal.</p>



<p><strong>Closing Arguments</strong></p>



<p>Once all the witnesses have been called, both the AUSA and we, the federal defense criminal defense attorneys, have presented all their evidence, and both have indicated to the court that they have rested, the next step is closing argument.</p>



<p>According to the <a href="https://www.uscourts.gov/sites/default/files/criminal_federal_rules_pamphlet_dec_1_2023.pdf">Federal Rules of Criminal Procedure</a>, the government goes first, the defense attorneys goes next, then the government gets another opportunity to rebut what the defense attorney has argued. The government gets to go first, and last, because they have the burden of proof.</p>



<p>Unlike the opening statement, in their final arguments, the AUSA and the federal criminal defense attorney may not only summarize the evidence presented but may also forcefully argue why the jury should find in their favor.</p>



<p>It is important to note, that district court judges will typically deny us the time, at the end of the trial, to leave and prepare our closing arguments.&nbsp; It is typical to move right into closing arguments after all the evidence has been received by the jury, and any directed verdict motions made and denied.</p>



<p>The Jury is then instructed as to the applicable law through what is known as jury charges.</p>



<p>The main purpose of a jury is to resolve issues of fact. A jury will reach its verdict by taking the law as provided to them by the judge and applying to this law to the facts as they find them. In this way they will arrive at their verdict. This law is set forth in the jury instructions.</p>



<p>Judges routinely state they will rely mainly on the pattern instructions prepared by the Circuit Committee on Pattern Criminal Jury instructions.&nbsp; We certainly research notable and useful jury charges and file such if we determine the pattern charges are not sufficient.</p>



<p><strong>Deliberations and Verdict</strong></p>



<p>The final stage in a federal criminal trial will be jury deliberations and verdict. The first thing the jury will do is select, often by voting, who will be their foreperson. Pattern jury instruction for the 11th circuit provides that the foreperson’s job is to do two things: (1) guide the jury’s deliberations and (2) be a liaison for communications with the court.</p>



<p>If the jury has questions, then normally, the foreperson will write it down, give it to the court officer who then gives the question to the judge. The jury may not tell anyone outside the jury where their “vote” stands or anything else about their deliberations. There is, however, no rule that says that only the foreperson may write down questions or give them to the court officer. In this way all jurors are “equal”.</p>



<p>In a criminal case the verdict must be unanimous in favor of acquittal or conviction. In a federal criminal case, a jury will be instructed they are to continue their deliberations until they have reached a unanimous decision. Pattern Jury Instructions on this issue provide that to find a defendant guilty in a federal criminal trial, the jury must unanimously agree that the government has overcome the presumption of innocence as to every element of the crime alleged and have done so with evidence that proves the defendant is guilty beyond a reasonable doubt.</p>



<p>As set forth in another&nbsp;Pattern Jury Instruction, the jury will be told that they are not to consider punishment in their deliberations. Punishment is solely the province of the judge presiding over the case.</p>



<p>Once the jury has reached its verdict, another&nbsp;Pattern Jury Instruction provides that the foreperson mark the appropriate place for guilty or not guilty, have each member sign the form, then give it to the court officer, who will then give the form to the judge.</p>



<p>Upon learning that the jury has reached its verdict, the judge will resume the trial, making sure the defendant is in the courtroom. Finally, the verdict will be read in court.</p>



<p>Once the verdict is read, if you are found guilty, the deputies (who have moved in to position for this moment) will come forward and ask you to put your hands behind your back and take off shoe laces, jewelry, etc in order to go in to custody.&nbsp; The federal criminal defense attorney immediately asks that the defendant remain out on an appeal bond, and the judge decides on whether or not to take the defendant in to custody at this time.</p>



<p>If you are found not guilty on all charges, then the case is over and closed.</p>



<p>Should you have any further questions about federal criminal defense trials please&nbsp;<a href="https://www.conawayandstrickler.com/contact-us.html">contact us</a>.&nbsp; We are here to help.</p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Recent Computer Hacking Cases in the News]]></title>
                <link>https://www.conawayandstrickler.com/blog/recent-computer-hacking-cases-in-the-news/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/recent-computer-hacking-cases-in-the-news/</guid>
                <dc:creator><![CDATA[Law Office of Conaway & Strickler]]></dc:creator>
                <pubDate>Sun, 24 Nov 2024 19:06:00 GMT</pubDate>
                
                    <category><![CDATA[Criminal Defense]]></category>
                
                    <category><![CDATA[cryptocurrency]]></category>
                
                    <category><![CDATA[Cyber Crime]]></category>
                
                    <category><![CDATA[data breach]]></category>
                
                    <category><![CDATA[Identity Theft]]></category>
                
                    <category><![CDATA[money laundering]]></category>
                
                    <category><![CDATA[White Collar Crimes]]></category>
                
                
                    <category><![CDATA[#bitcoin]]></category>
                
                    <category><![CDATA[#cryptocurrency]]></category>
                
                    <category><![CDATA[#moneylaundering]]></category>
                
                    <category><![CDATA[atlanta criminal lawyer]]></category>
                
                    <category><![CDATA[best federal criminal lawyer]]></category>
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[federal criminal defense]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                
                
                <description><![CDATA[<p>Recently, Robert Purbeck of Idaho, also known as “Lifelock,” and “Studmaster,”  was sentenced to ten years after pleading guilty to federal charges of computer fraud and abuse.  He hacked into the computer servers of the City of Newnan, Georgia  and a Griffin, Georgia medical clinic, and then targeted at least 17 other victims across the&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>Recently, Robert Purbeck of Idaho, also known as “Lifelock,” and “Studmaster,”  was sentenced to ten years after pleading guilty to federal charges of computer fraud and abuse.  He <a href="https://www.11alive.com/article/news/local/city-of-newnan-experiences-data-breach/85-a76aa042-9758-4403-aad9-beba3976f401" target="_blank" rel="noreferrer noopener">hacked</a> into the computer servers of the City of Newnan, Georgia  and a Griffin, Georgia medical clinic, and then targeted at least 17 other victims across the United States – in the process stealing personal information of more than 132,000 individuals.  He also attempted to extort a Florida orthodontist for payment in Bitcoin, threatening to disclose stolen patient records and other personal information.</p>



<p>“Cyber extortion is unfortunately a rapidly growing threat and highlights the ever-growing need for corporations to remain vigilant in cybersecurity efforts,” <a href="https://www.justice.gov/usao-ndga/pr/idaho-man-sentenced-computer-hacking-and-extortion-scheme" target="_blank" rel="noreferrer noopener">said Sean Burke, Acting Special Agent in Charge of FBI Atlanta</a>. “This sentencing is just one example of the FBI working together to hold criminals that hide behind their computers accountable, regardless of their location.”</p>



<p>According to information presented in court, in June 2017, Purbeck purchased access to the computer server of a Griffin medical clinic on a darknet marketplace. He then used the stolen credentials to illegally access the computers of the medical clinic and removed records that contained the sensitive personal information of more than 43,000 individuals, including names, addresses, birth dates, and social security numbers.</p>



<p>In February 2018, Purbeck purchased access to a City of Newnan Police Department server on a darknet marketplace. Purbeck used the stolen credentials to hack into the City of Newnan’s computer systems and stole police reports and other documents, including personal information of more than 14,000 individuals.</p>



<p>Purbeck also attempted to extort a Florida orthodontist in July 2018, demanding a ransom payment in Bitcoin in return for his stolen patient files, threatening to sell the patient and personal information unless the orthodontist paid the ransom. Additionally, Purbeck threatened to sell the personal information of the orthodontist’s minor child. Purbeck harassed the orthodontist and his patients for 10 days with numerous threatening emails and text messages.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p>Song Wu, Chinese national, was indicted in September 2024, on charges for wire fraud and aggravated identity theft arising from his efforts to fraudulently obtain computer software and source code created by the National Aeronautics and Space Administration (“NASA”), research universities, and private companies.</p>



<p>“Efforts to obtain our nation’s valuable research software pose a grave threat to our national security,” <a href="https://www.justice.gov/usao-ndga/pr/chinese-national-charged-multi-year-spear-phishing-campaign" target="_blank" rel="noreferrer noopener">said U.S. Attorney Ryan K. Buchanan</a>. “However, this indictment demonstrates that borders are not barriers to prosecuting bad actors who threaten our national security.” According to information presented in court, Song allegedly engaged in a multi-year “spear phishing” email campaign in which he created email accounts to impersonate U.S.-based researchers and engineers and then used those imposter accounts to obtain specialized restricted or proprietary software used for aerospace engineering and computational fluid dynamics. This specialized software could be used for industrial and military applications, such as development of advanced tactical missiles and aerodynamic design and assessment of weapons. In executing the scheme, Song allegedly sent spear phishing emails to individuals employed in positions with the United States government, including NASA, the U.S. Air Force, Navy, and Army, and the Federal Aviation Administration.  Song also sent spear phishing emails to individuals employed in positions with major research universities in Georgia, Michigan, Massachusetts, Pennsylvania, Indiana, and Ohio, and with private sector companies that work in the aerospace field. Song’s spear phishing emails appeared to the targeted victims as having been sent by a colleague, associate, friend, or other person in the research or engineering community. His emails requested that the targeted victim send or make available source code or software to which Song believed the targeted victim had access. According to the indictment, while conducting this spear phishing campaign, Song was employed as an engineer at Aviation Industry Corporation of China (“AVIC”), a Chinese state-owned aerospace and defense conglomerate headquartered in Beijing, China.  AVIC manufactures civilian and military aircrafts and is one of the largest defense contractors in the world.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p>Ilya Lichtenstein, 35, of New York City, was sentenced recently to 60 months in federal prison for his involvement in a money laundering conspiracy arising from the hack and theft of approximately 120,000 bitcoin from Bitfinex, a global cryptocurrency exchange. According to information presented in court, Lichtenstein hacked into Bitfinex’s network in 2016, using advanced hacking tools and techniques. Once inside the network, Lichtenstein fraudulently authorized more than 2,000 transactions transferring 119,754 bitcoin from Bitfinex to a cryptocurrency wallet in Lichtenstein’s control. Lichtenstein then took steps to cover his tracks by deleting from Bitfinex’s network access credentials and other log files that could have revealed his conduct to law enforcement. Following the hack, Lichtenstein enlisted the help of his wife, Heather Morgan, in laundering the stolen funds. Lichtenstein, at times with Morgan’s assistance, employed numerous sophisticated laundering techniques, including using fictitious identities to set up online accounts; utilizing computer programs to automate transactions; depositing the stolen funds into accounts at a variety of darknet markets and cryptocurrency exchanges and then withdrawing the funds; converting bitcoin to other forms of cryptocurrency in a practice known as “chain hopping;” depositing a portion of the criminal proceeds into cryptocurrency mixing services; using U.S.-based business accounts to legitimize Lichtenstein’s and Morgan’s banking activity; and exchanging a portion of the stolen funds into gold coins. Additional information on this case is available on the United States Department of Justice’s website for large cases <a href="https://www.justice.gov/usao-dc/2016-bitfinex-hack">here</a>. &nbsp;</p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Paycheck Protection Program Enforcement Continues]]></title>
                <link>https://www.conawayandstrickler.com/blog/paycheck-protection-program-enforcement-continues/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/paycheck-protection-program-enforcement-continues/</guid>
                <dc:creator><![CDATA[Law Office of Conaway & Strickler]]></dc:creator>
                <pubDate>Fri, 25 Oct 2024 13:36:00 GMT</pubDate>
                
                    <category><![CDATA[EIDL fraud]]></category>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                    <category><![CDATA[Federal Offenses]]></category>
                
                    <category><![CDATA[Fraud]]></category>
                
                    <category><![CDATA[PPP loan fraud]]></category>
                
                    <category><![CDATA[White Collar Offenses]]></category>
                
                
                    <category><![CDATA[bank fraud]]></category>
                
                    <category><![CDATA[best federal criminal lawyer]]></category>
                
                    <category><![CDATA[EIDL fraud]]></category>
                
                    <category><![CDATA[federal criminal defense]]></category>
                
                    <category><![CDATA[IRS]]></category>
                
                    <category><![CDATA[PPP Loan Fraud]]></category>
                
                    <category><![CDATA[SBA-OIG]]></category>
                
                
                
                <description><![CDATA[<p>As discussed in our prior blogs, the Department of Justice has already&nbsp;been&nbsp;prosecuting&nbsp;cases of larger-scale, outright PPP fraud.&nbsp; In August 2022, President Biden signed two bills into law that give the Department of Justice and other federal agencies more time to investigate and prosecute Paycheck Protection Program (“PPP”) and COVID-19 Economic Injury Disaster Loan (“EIDL”) cases.&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>As discussed in our prior <a href="https://www.conawayandstrickler.com/blog/ppp-loan-fraud-prosecutions-continue/">blogs</a>, the Department of Justice has already&nbsp;been&nbsp;prosecuting&nbsp;cases of <a href="https://wsvn.com/news/special-reports/the-great-scam-federal-prosecutors-take-us-inside-south-floridas-most-shocking-cases-of-covid-relief-fraud/">larger-scale, outright PPP fraud</a>.&nbsp; In August 2022, President Biden signed two bills into law that give the Department of Justice and other federal agencies more time to investigate and prosecute Paycheck Protection Program (“PPP”) and COVID-19 Economic Injury Disaster Loan (“EIDL”) cases. H.R. 7352, the “PPP and Bank Fraud Enforcement Harmonization Act of 2022” and H.R. 7334, the “COVID-19 EIDL Fraud Statute of Limitations Act of 2022” extend the statute of limitations for fraud charges involving PPP and EIDL fraud to <strong>ten years.&nbsp;&nbsp;</strong>This has allowed the government more time to prosecute these cases.&nbsp; And they continue to do so with increasing frequency.&nbsp; Recently the government was involved in prosecuting this <a href="https://www.irs.gov/compliance/criminal-investigation/over-20-defendants-sentenced-to-prison-in-multimillion-dollar-national-covid-19-fraud-scheme">covid-19 related schemes</a>,</p>



<p>In investigating PPP loan fraud, the government first looks at the application itself.&nbsp; How many employees does the company have?&nbsp; Does that number match their payroll tax filings?&nbsp; Are the <a href="https://www.irs.gov/forms-pubs/about-form-941">941</a>‘s the same as what is on file at the IRS?&nbsp; Has the owner(s) been convicted of or pled guilty to a felony with the past 5 years?&nbsp; Do the bank statements submitted on the PPP loan application match the actual bank statements? Are there business expenses on the bank statements?&nbsp; Was the bank account in a business checking account? When was the entity created?&nbsp; Did the company apply for more than one loan?&nbsp; Does the individual owner have multiple entities and apply for multiple loans?&nbsp; Any inaccurate statements on the application can result in a charge under Under <a href="https://www.law.cornell.edu/uscode/text/18/1344">18 U.S.C. § 1344</a> (bank fraud) – making false statements to an FDIC-insured financial institution, or making false statements to the SBA.&nbsp; In addition, the CARES Act also has requirements for how companies <em>use</em>, and account for the use of, PPP loan funds.&nbsp; Some of the more outrageous PPP loan fraud prosecutions have resulted due to individuals buying&nbsp;<a href="https://krdo.com/news/2021/12/08/man-sentenced-for-162k-in-ppp-fraud-used-money-to-buy-range-rover/">Range Rovers</a>, <a href="https://www.justice.gov/opa/pr/florida-man-sentenced-after-fraudulently-obtaining-39-million-ppp-loans">Lamborghinis</a> and&nbsp;<a href="https://www.cnn.com/2021/11/30/us/covid-loan-texas-man-sentenced-fraud-trnd/index.html">rolex watches</a> with PPP loan proeeeds, i.e. converting PPP loan funds for personal use.&nbsp; Also, when seeking forgiveness for loans, companies must be very careful in what they submit.&nbsp; Any false documentation submitted can result in prosecution.</p>



<p>So, should the government be inquiring about your PPP loan(s) or EIDL loans or any disaster relief funds, it is important to&nbsp;<a href="https://www.conawayandstrickler.com/contact-us.html">contact us</a> immediately.&nbsp; Being evasive or being unable to produce documentation of PPP Compliance will only increase issues that you will be facing.&nbsp; Allow Conaway & Strickler, PC to help you with expert advice from experienced federal counsel. We are very familiar with the federal criminal investigative process with the SBA-OIG, IRS and the DOJ.</p>



<p>Conaway & Strickler, PC handles PPP loans nationwide. <a href="https://profiles.superlawyers.com/georgia/atlanta/lawyer/meg-strickler/7f97386c-4637-4dc1-9ed0-0d95f41dda56.html">Meg Strickler</a> has 25 plus years experience fighting federal criminal cases in the district courts across the country.</p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[When Can Law Enforcement Search my Cell Phone?]]></title>
                <link>https://www.conawayandstrickler.com/blog/when-can-law-enforcement-search-my-cell-phone/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/when-can-law-enforcement-search-my-cell-phone/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Sat, 14 Sep 2024 14:38:34 GMT</pubDate>
                
                    <category><![CDATA[Criminal Defense]]></category>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                    <category><![CDATA[Federal Offenses]]></category>
                
                
                    <category><![CDATA[aggravated identity theft]]></category>
                
                    <category><![CDATA[best federal criminal lawyer]]></category>
                
                    <category><![CDATA[Criminal defense]]></category>
                
                    <category><![CDATA[drug trafficking]]></category>
                
                    <category><![CDATA[federal crimes]]></category>
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[wire fraud]]></category>
                
                
                
                <description><![CDATA[<p>Cell phones are everywhere today and thus play a significant role in criminal investigations. What reports are generated from my devices? Cellebrite reports provide information about phone calls and text messages; but now it also provides a report on the data stored on these devices such as voicemails, images, and browsing history. From GPS location&hellip;</p>
]]></description>
                <content:encoded><![CDATA[

<p>Cell phones are everywhere today and thus play a significant role in criminal investigations.</p>


<p>
<strong>What reports are generated from my devices? </strong>
</p>


<p><a href="https://cellebrite.com/en/reader/" rel="noopener noreferrer" target="_blank">Cellebrite</a> reports provide information about phone calls and text messages; but now it also provides a report on the data stored on these devices such as voicemails, images, and browsing history.  From GPS location data to social media activity, cell phones can provide a treasure trove for law enforcement agencies to use to build their cases.</p>


<p>
<strong>What protections do I have to prevent law enforcement from searching my devices?</strong>
</p>


<p>Laws on the admission and use of this evidence in court are still evolving.  In the Georgia Supreme Court case <a href="https://caselaw.findlaw.com/court/ga-supreme-court/2189282.html" rel="noopener noreferrer" target="_blank">State v. Wilson,</a> the court ruled search warrants for cell phone contents must <em>specify</em> the items being sought. This is to prevent a general search of a person’s belongings, which is prohibited by the Fourth Amendment.</p>


<p>
<strong>Do I have the same legal rights at the border that I would elsewhere in the United </strong><strong>States?</strong></p>


<p>The Supreme Court ruled that the police must get a warrant before searching someone’s cell phone in <a href="https://supreme.justia.com/cases/federal/us/573/373/" rel="noopener noreferrer" target="_blank">Riley v. California</a>. The Supreme Court held that a warrant is generally required before a search of a cell phone seized incident to arrest.  BUT, at the border, there is less protection.  According to <a href="https://www.cbp.gov/sites/default/files/documents/inspectionelectronic-devices-tearsheet.pdf)" rel="noopener noreferrer" target="_blank">US Customs and Border Protection</a> a person may be chosen for inspection for many different random reasons and thus there is less protections when crossing the border in or out of the US.  What this means – you can be pulled for a secondary inspection and all of your devices can be searched without a warrant.  They can also get an image from the hard drive of these devices and / or seize the devices at the border.</p>


<p><strong>What do I do if I am asked to give my cell phone to law enforcement?</strong></p>


<p>If you know your rights, you can comply when necessary.  So, for example, if you are traveling internationally – do not travel with
devices that you would not want searched.  Furthermore, if you are driving and pulled over with drugs or a high amount of currency in your car, etc, your cell phone and / or other devices WILL be seized and analyzed.</p>


<p>And, please remember <em>anything</em> uploaded to the cloud is fair game for law enforcement.   That’s a broad statement – but when you signed up for Instagram, Whats App, Google, TikTok, Facebook, Signal, Twitter/X, etc, you signed away any privacy rights.  Those companies are fast to comply with law enforcement subpoenas giving whatever you posted/uploaded immediately to them.</p>


]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Georgia RICO Defined]]></title>
                <link>https://www.conawayandstrickler.com/blog/georgia-rico-defined/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/georgia-rico-defined/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Sat, 02 Sep 2023 00:56:14 GMT</pubDate>
                
                    <category><![CDATA[Criminal Defense]]></category>
                
                    <category><![CDATA[Fraud]]></category>
                
                    <category><![CDATA[RICO]]></category>
                
                    <category><![CDATA[White Collar Crimes]]></category>
                
                
                    <category><![CDATA[#Trump19]]></category>
                
                    <category><![CDATA[best federal criminal lawyer]]></category>
                
                    <category><![CDATA[criminal defense lawyer]]></category>
                
                    <category><![CDATA[GA RICO]]></category>
                
                    <category><![CDATA[RICO]]></category>
                
                
                
                    <media:thumbnail url="https://conawayandstrickler-com.justia.site/wp-content/uploads/sites/908/2023/07/IMG_4620-scaled-1.jpeg" />
                
                <description><![CDATA[<p>Trump has been indicted in Fulton County Superior Court. So, what is RICO and why is it important in this case? The Racketeer Influenced and Corrupt Organizations Act, or RICO, was original designed to fight organized crime. It was enacted in 1970 after being signed into law by President Richard Nixon. And, within a few&hellip;</p>
]]></description>
                <content:encoded><![CDATA[

<p>Trump has been <a href="https://d3i6fh83elv35t.cloudfront.net/static/2023/08/CRIMINAL-INDICTMENT-Trump-Fulton-County-GA.pdf" rel="noopener noreferrer" target="_blank">indicted</a> in Fulton County Superior Court.</p>


<p>So, what is RICO and why is it important in this case?</p>


<p>The Racketeer Influenced and Corrupt Organizations Act, or RICO, was original designed to fight organized crime. It was enacted in 1970 after being signed into law by President Richard Nixon.  And, within a few years, Georgia enacted their own version, and of course, as years went by, both state and federal prosecutors saw opportunities to expand the use to other types of cases.</p>


<p>Georgia’s RICO Act was adopted in 1980.</p>


<p>RICO aka Racketeering charges are confusing and complex.  Many racketeering prosecutions I have been involved in defending have targeted alleged illegal drug operations, gang related cases and fraud related cases both at the state and federal level.   I even had a case where my client was the sole defendant in a RICO case.</p>


<p>So now that Trump and the other 18 defendants are indicted under that Georgia RICO charge, all Fani and her office need to prove is just two felonies and that those felonies occurred in Fulton County.  That’s a low threshold for those folks to face that mandatory minimum of five years in prison!  Plus, any other crimes (as you see in the indictment) in other counties or states can also be included.   I have provided the link to the indictment above as it illustrates how ornate a prosecutor will go to detail all of the “acts of racketeering activity and overt acts in furtherance of the conspiracy”.</p>


<p>Predicate acts may not be illegal on their own in Georgia, but under the RICO act, if they were in furtherance of the conspiracy and furtherance of the criminal enterprise, then predicate acts become illegal.</p>


<p><a href="https://law.justia.com/codes/georgia/2021/title-16/chapter-14/section-16-14-4/" rel="noopener noreferrer" target="_blank">O.C.G.A. §16-14-4</a> outlines four ways a person can be guilty of violating the Racketeering statute:
</p>


<ol class="wp-block-list">
<li>By directly or indirectly acquiring or maintaining any interest in or control of any enterprise, real property or personal property through a pattern of racketeering or the proceeds derived from the activity;</li>
<li>By directly or indirectly participating in an enterprise through a pattern of racketeering activity while being employed by, or associated with, the enterprise;</li>
<li>By conspiring or endeavoring to directly or indirectly acquire or maintain any interest in, or control of, any enterprise, real property or personal property through a pattern of racketeering activity or the proceeds derived from a pattern of racketeering activity; or</li>
<li>By conspiring or endeavoring to directly or indirectly participate in an enterprise through a pattern of racketeering activity while being employed by, or associated with, the enterprise.</li>
</ol>


<p>
So if they participate in an interrelated pattern of criminal activity motivated by or resulting in monetary gain or economic or physical threat or injury, then a conviction of RICO will occur.</p>


<p>Predicate crimes that fall under the GA RICO statute include drug offenses, homicide, bodily injury, arson, burglary, forgery, theft, prostitution, obscene materials, bribery, witness tampering, perjury, evidence tampering, commercial gambling, distilling liquors and alcoholic beverages, firearm violations, securities violations, credit card fraud, computer crimes, kidnapping, carjacking, and making terroristic threats.  That’s quite a long list…..</p>


<p>So, what kind of defenses are there for RICO charges?  Obvious ones that come to mind are  – that long list of acts in the indictment were not “in furtherance of the conspiracy”.  Another defense that can be advanced is the state can’t prove beyond a reasonable dought that two predicate acts were committed.  And finally, there was zero pattern of anything.</p>


<p>If you are facing a RICO charge, please feel free to <a href="/contact-us/">contact us</a> for additional information.  Conaway & Strickler, PC is here to help.</p>


<p>Also, please see <a href="https://www.bbc.com/news/world-us-canada-66465240" rel="noopener noreferrer" target="_blank">here</a> for more comments about RICO in the BBC news.  Meg Strickler has been quoted about this case in several news outlets in the past month discussing Trump and the Trump 19 indictment in Fulton County.
</p>


<h2 class="wp-block-heading"></h2>


]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[How is White Collar Crime Generally Prosecuted?]]></title>
                <link>https://www.conawayandstrickler.com/blog/how-is-white-collar-crime-generally-prosecuted/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/how-is-white-collar-crime-generally-prosecuted/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Mon, 10 Jul 2023 17:17:13 GMT</pubDate>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                    <category><![CDATA[Federal Offenses]]></category>
                
                    <category><![CDATA[Identity Theft]]></category>
                
                    <category><![CDATA[money laundering]]></category>
                
                    <category><![CDATA[SEC]]></category>
                
                    <category><![CDATA[Theft Crimes]]></category>
                
                    <category><![CDATA[White Collar Crimes]]></category>
                
                    <category><![CDATA[White Collar Offenses]]></category>
                
                
                    <category><![CDATA[best federal criminal lawyer]]></category>
                
                    <category><![CDATA[embezzlement]]></category>
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[fraud lawyer]]></category>
                
                    <category><![CDATA[top federal criminal attorney]]></category>
                
                    <category><![CDATA[white collar lawyer]]></category>
                
                
                
                    <media:thumbnail url="https://conawayandstrickler-com.justia.site/wp-content/uploads/sites/908/2023/07/IMG_4620-scaled-1.jpeg" />
                
                <description><![CDATA[<p>The Department of Justice investigates and prosecutes cases where large amounts of money is alleged to have been taken. Examples of white collar crimes are money laundering, bank, wire and mail fraud, tax evasion, insider trading, insurance fraud, mortgage fraud, bribery and embezzlement. Of course Homeland Security, the FBI, the IRS, Customs and Border Patrol&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>The Department of Justice investigates and prosecutes cases where large amounts of money is alleged to have been taken. Examples of white collar crimes are money laundering, bank, wire and mail fraud, tax evasion, insider trading, insurance fraud, mortgage fraud, bribery and embezzlement.  Of course Homeland Security, the FBI, the IRS, Customs and Border Patrol and SEC can also investigate and prosecute cases of fraud as well.  </p>



<p>The government has a special United States Guideline Chapter dedicated to <a href="https://guidelines.ussc.gov/gl/§2B1.1" rel="noopener noreferrer" target="_blank">“basic” economic offenses</a>.  For purposes of this blog, this chapter will be discussed in more detail below.  As with anything involving federal criminal litigation, nothing is crystal clear in the law. Therefore, there is also a chapter in the United States Guidelines dedicated to tax offenses, election fraud, gambling, and money laundering in the United States Sentencing Guidelines.  </p>



<p>This USSG chapter DOES cover extortion, bribery, kickbacks, counterfeiting, embezzlement, health care fraud, computer fraud, insurance fraud, securities fraud, mortgage fraud, identity fraud, bankruptcy fraud, etc.   What is most important in this chapter is the loss amount.   All charges start off with a base offense level of  6 or 7 depending on the statutory max of the offense charged. Then, you look at what the “loss amount” is using the below table.
</p>



<figure class="wp-block-table is-style-regular"><table class="has-light-background-color has-background has-fixed-layout"><thead><tr><th>Loss (apply the greatest)</th><th>Increase in Level</th></tr></thead><tbody><tr><td>(A) $6,500 or less</td><td>no increase</td></tr><tr><td>(B) More than $6,500</td><td>add 2</td></tr><tr><td>(C) More than $15,000</td><td>add 4</td></tr><tr><td>(D) More than $40,000</td><td>add 6</td></tr><tr><td>(E) More than $95,000</td><td>add 8</td></tr><tr><td>(F) More than $150,000</td><td>add 10</td></tr><tr><td>(G) More than $250,000</td><td>add 12</td></tr><tr><td>(H) More than $550,000</td><td>add 14</td></tr><tr><td>(I) More than $1,500,000</td><td>add 16</td></tr><tr><td>(J) More than $3,500,000</td><td>add 18</td></tr><tr><td>(K) More than $9,500,000</td><td>add 20</td></tr><tr><td>(L) More than $25,000,000</td><td>add 22</td></tr><tr><td>(M) More than $65,000,000</td><td>add 24</td></tr><tr><td>(N) More than $150,000,000</td><td>add 26</td></tr><tr><td>(O) More than $250,000,000</td><td>add 28</td></tr><tr><td>(P) More than $550,000,000</td><td>add 30.</td></tr></tbody></table></figure>



<p>
The loss amount is a pandora box of confusion and the government is able to add all kinds of <a href="https://www.ussc.gov/sites/default/files/pdf/training/primers/2018_Primer_Relevant_Conduct.pdf" rel="noopener noreferrer" target="_blank">relevant conduct</a> and <a href="https://www.ussc.gov/sites/default/files/pdf/training/primers/2022_Primer_Loss.pdf" rel="noopener noreferrer" target="_blank">intended loss</a> conduct to inflate these numbers.</p>



<p>To further make things complicated, there are enhancements in this section that permit the government to add levels for things such as the use of sophisticated means, role in the offense, number of victims, a defrauding a charity, mass marketing, among others.</p>



<p>Navigating the federal criminal system is a task that should not be endured alone. <a href="/contact-us/">Contact</a> our team today for more information about we can protect your rights and your freedom.</p>
]]></content:encoded>
            </item>
        
    </channel>
</rss>